DATASHEET
Zscaler Cloud Application Visibility and Control ®
ST
NET SECURIT Y& TER IN C ANCE PLI M O
WORL D’S BE
MAKING CLOUD APPLICATIONS SAFE AND PRODUCTIVE FOR BUSINESS
Unified Admin & Services Firewall
Open Partner Ecosystem SSL inspection
Bandwidth control
Global Software as a Service platform and operations
Zscaler Cloud Application Visibility & Control enables you to secure and manage cloud applications used by your organization. With Zscaler you can discover which cloud applications are being used by your employees, set granular access and use policies, monitor and report on usage in real time, and protect against cyber threats and data loss.
Key Benefits Get real-time traffic visibility • Get real time visibility into application usage—across ‘IT sanctioned’ and ‘shadow IT’ applications
THE ZSCALER PLATFORM
• Analyze all user activity—across cloud applications and web—through a single
Zscaler’s award-winning Security as
• Use pre-built reports or customize reports to your business needs • Simplify SOC operations with out-of-the-box SIEM integration
a Service platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone,
reporting portal
Enforce compliance with sophisticated, granular policy controls • Control application access at the user, group, department and/or location level • Set granular action, time and/or bandwidth based policy for specific applications or application groups
operating in more than 100 data
• Create and apply policies in real time across users, devices and locations
centers around the world and enabling
Block cyber threats with in-line threat protection
organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade secure internet, advanced persistent threat (APT)
• Protects against known and unknown threats, including Advanced Persistent Threats (APTs) • Inspects every byte of traffic in real time, and all threats are automatically blocked • Automatically decrypts SSL traffic in real time to scan for malware
Secure your critical data with built-in data loss prevention • Scans all traffic, including SSL encrypted traffic, to prevent sensitive and confidential data from leaving the organization
protection, data loss prevention (DLP),
• Stops data exfiltration attempts from infected devices, including Internet-connected devices
SSL decryption, traffic shaping, policy
• Choose which traffic to decrypt and inspect to maximize security while ensuring privacy
management and threat intelligence—
Enhance productivity and reduce costs, with bandwidth controls
all without the need for on-premise hardware, appliances or software.
• Monitor usage and control access to restrict time spent on non-productive applications • Prioritize bandwidth for business critical applications to ensure optimal user experience • Limit bandwidth for non-business applications, reducing the need to buy unnecessary bandwidth